Author
Topic: Anonymous I-net surfing ? (Read 3619 times)

Does anyone have expertise in this area? Let's assume we all "delete all" of our browsing history and use CCLEANER before we log off each time for security reasons. Lets also assume we are not doing anything illegal and we are not worried about someone in our household discovering where we went. That said - Is there a reason a person needs to surf the net anonymously? If the answer is yes, are there any software recommendations? Over the last five years I have had my credit card number stolen twice. Both times the banks told me it was part of a greater I-net scam of some type. I lost nothing, the fradulent charges were taken off my account, and the card numbers were changed. Thoughts? Thanks.

The question is: is there a reason to NOT surf anonymously? It is not "do I have something to hide" but "do I want EVERYONE to see it"?

However, anonymity is but one part of security. Using TOR you can cover your tracks a little better. But you also want to make sure to use https when submitting sensitive information; and always ask: "do they really really need this information"?

It were nice if we had secure communications (no sniffing agents in the middle) and plausible deniability (no officer, it wasn't me).

What we do have is a little more secure ways of communication (by encryption) but no plausible deniability.

However all this does not help, when the site we use is operated by less nice people. And we do not have a usable way of checking their credibility, their "reputation": certificates can be and are forged, DNS is poisoned.

Every TCP/IP packet going from point A to point B contains the identifying IP address of both A & B, it's part of the protocol, there is no geting around it. Using a proxy only complicates things a bit...it doesn't make it impossible to identify you.

Every TCP/IP packet going from point A to point B contains the identifying IP address of both A & B, it's part of the protocol, there is no geting around it. Using a proxy only complicates things a bit...it doesn't make it impossible to identify you.

A packet going through TOR will not have A as source IP when it reaches B, just like a server won't see 192.168.x.x (or whatever other internal LAN IP) when going through a NATing router.

But there are attacks against the network that, if the attacker is dedicated enough, can let him trace entry- and exit points (if he can control both, iirc?) and thus determine your traffic. Not super-trivial though.